避免使用多個 的英文怎麼說

中文拼音 [miǎnshǐyòngduō]
避免使用多個 英文
multiple string concatenations
  • : 動詞1. (躲開;迴避) avoid; evade; dodge; seek shelter; shun; flee 2. (防止; 避免) prevent; keep away; repel
  • : Ⅰ動詞1 (去掉;除掉) dismiss; relieve; remove 2 (避免) avoid; escape; avert 3 (免去) excuse s...
  • 使 : Ⅰ動詞1 (派遣; 支使) send; tell sb to do sth : 使人去打聽消息 send sb to make inquiries2 (用; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 個Ⅰ量詞1 (用於沒有專用量詞的名詞) : 一個理想 an ideal; 兩個月 two months; 三個梨 three pears2 ...
  • 避免 : avoid; refrain from; avert; prevent sth. happening; shun
  1. In the study of the lumber carrier, one of the very important problem is the in spot and ultimate station due to flooding which will bring tremendous threat to the ship because of the few holds in order to study the lumber carrier buoyancy, stability and longitudinal strength under the condition of flooding, the paper adopt fundamental ship principle and iterative and accumulative concept on the basis of insumersibility theory to detailedly calculate the flooding speed flooding amount front draft after draft stability and longitudinal strength considering the ship " s sinking and inclination which will change the center of gravity and the loading station both in hold and on deck and the effect of flooding and lumber amount in holdo in the last, the paper introduces an example of the actual ship named " fei yun ling " and makes a contrast between not taking measure and taking measure which draws a reasonable conclusion and comes up to some advice the method avoids the cockamamie calculating while insures enough precision the paper draws a conclusion that not all the lumber carrier will submerge when suffering the damaged flooding if the loading or measure is suitable

    為了研究運木船舶在破艙狀態下的浮性、穩性和強度,本文在抗沉性理論的基礎上,運船舶基本原理,採了迭代和累計的思想,將船舶的進水過程劃分為很次進水的積累,詳細計算了運木船在破艙進水的過程中,考慮到各種破艙參數、船舶本身的下沉、艙室內木材、甲板貨的裝載情況和在進水過程中船舶本身的傾斜對進水重心的影響,以及艙室內的進水量和木材對破口處進水速度的影響,船舶總的進水速度、進水量、首尾吃水、穩性的實時狀態和最終船舶的總縱強度,給出了計算實例,並進行了在採取泵抽水前後浮態參數的對比,得出了該船舶在艙室內的貨物積載量達到某數值時可以保證船舶在破艙進水時不會沉沒,或者在當開口小於某數值時,採取適當的措施后,可以使船舶沉沒。
  2. 2 the aggregate model of life insurance establish an aggregate model of life insurance by applying the alien modernly insurance actuarial theories and techniques, including deferred life annuities, whole life insurance and returnable premiums. the model has the following properties : ( a ) through the regulation of various parameters in the model, various insurance products can be obtained ; ( b ) the introduction of whole life annuities in the model eases economic predicament when the insured retire ; ( c ) a returnable premium part in the model makes the insurance products have double functions of insurance and savings ; ( d ) an endowment insurance actuarial model also can be gotten when annuity is continuous. and construct an optimization model based on aggregate model of life insurance

    保險精算模型具有如下性質: ( a )保險公司可以根據實際情況調整參數,不同參數的組合可以得到不同的保險產品,靈活適性較強; ( b )年金的引入,可以緩解投保人退休后的經濟窘境,或減小因退休而面臨的經濟影響,保險的社會保障性得到了很好的體現; ( c )模型中的還本部分,使得這種保險產品具有儲蓄和保險的雙重功能,不僅擴大了保險的社會職能,而且對于投保人來說,了一種安全的投資選擇; ( d )年金連續的情況下,建立了具有儲蓄功能的養老保險精算模型。
  3. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7核心節點(採cisco12012 、 2 * 2 . 5gdpt環) ,三十八匯接節點,能提供寬帶,窄帶種接入方式的公眾ip網,現擁有近20萬戶,佔全市網際網路戶四分之三以上,作為這樣一擁有眾戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增,如dos / ddos攻擊;所使的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等方面原因。
  4. In the doctor s little household, as in very many others, the articles of daily consumption that were wanted were purchased every evening, in small quantities and at various small shops

    跟許家庭一樣,醫生小家庭的日消費品是在晚上到各小商店少量購買的。人們都不希望惹人注意,盡量造成閑言閑語,或使人眼紅。
  5. Uses several tricks to achieve a high level of concurrency and avoid locking, including using multiple write locks for different hash buckets and exploiting the uncertainties of the jmm to minimize the time that locks are held - or avoid acquiring locks at all

    使了幾技巧來獲得高程度的並發以及鎖定,包括為不同的hash bucket (桶)使寫鎖和使jmm的不確定性來最小化鎖被保持的時間或者根本獲取鎖。
  6. Another example of the benefits of food preservatives highlighted by dr arim is the use of additives to protect many food ingredients from fungal infection which can lead to the contamination of the food by mycotoxins

    Dr . arim指出的另外一食物防腐劑好處的例子,是在許食物成分中使添加物來食物成分遭黴菌傳染而導致被真菌毒素污染食物。
  7. This thesis suggests a process considered minimizes the population size as similar individuals occur in the fitter members of the population, which helps reduce the execution times for ga by removing the redundancy associated with the saturation effect found in the later generation. this thesis uses a method that adds dynamic penalty terms to the fitness function according to the optimal degree of solutions, so as to create a gradient toward a feasible suboptimal or even optimal solutions. on the basis of the difference of the biggest and the smallest of fitness of individual, modifying the fitness function in order to convergence is a satisfaction

    動態調節種群大小,去掉遺傳演算法在迭代後期搜索產生的過相似體,達到減少計算時間的目的;按照解的優劣程度給適應度函數增加一在ga搜索過程中動態改變的可變罰函數,給搜索最優解創造一梯度,使遺傳演算法收斂到可行的較優解或最優解;根據適應度值最大和最小體的差修正適應度函數,使適應度函數值適中不容易造成收斂太快、局部收斂或根本不收斂而變成隨機搜索;為了「近親繁殖」採競爭擇優的交叉操作;利并行遺傳演算法的思想,提出一種自適應子種群進化策略;提出人口汰新政策來解決類似甚至相同的體的情況發生。
  8. On the other side, through the multi - aspects of research and the experience both from china and abroad on m & a, the article also clarifies its view on the efficiency theory, agency theory, transaction charges theory, value understatement theory, marketing influence theory and wealth reallocation theory. it also gives an explanation on the primitive motive on m & a, i. e. pursuing maximum profit and minimum competitive pressure, which, at the same time, generates the relevant effects : finance synergy, management synergy, market share effect, enterprise development effect, and strategy transit effect. the detail planning of a m & a strategy according to the relevant m & a motive is of critical importance to the success of a m & a operation

    企業並購從橫向並購、縱向並購、發展到混合併購,反映了企業並購的發展過程;從種角度對企業並購加以研究,並結合國內外企業並購的實際,闡述了企業並購的效率理論、代理理論、交易費理論、價值低估理論、市場勢力理論、財富再分配理論;分析了企業並購的原始動因? ?追求高額利潤與減少競爭壓力,並由此產生的效應? ?財務協同效應、管理協同效應、市場份額效應、企業發展效應、戰略轉移效應;根據企業並購的動機,謹慎規劃企業並購戰略,對企業並購成功至關重要,可以採中心角化戰略、復合角化戰略、垂直式整合戰略、水平式整合戰略來規劃企業並購;採合適的方法對目標企業進行價值評估是企業並購中一重要環節,正確評估目標企業的價值,使交易價格相對公正合理,並能提高交易成功率,決策失誤;確定企業並購價值后,採合理的支付方式,就完成了企業並購的最後工作。
  9. Autonomous navigation system is a important part of its, it can help to get safe, and smooth drive, and can ease or avoid unwanted traffic jam, and also can make the movement and usage of vehicle more convenient. it can facilitate the vehicle consumption and the environment inprovement

    自主式導航系統是智能交通系統的一重要組成部分,這一智能系統不僅能實現安全、通暢的駕駛,緩解或餘的交通堵塞,而且能使車輛的移動和使變得更加方便,促進了汽車消費和使環境的完善。
  10. This new enhanced filter also includes configurable logging options and multiple performance counters for tracking network usage and identifying security or performance issues before they cause problems

    這種新的增強型篩選器還包含有可配置的記錄選項以及性能計數器,可於跟蹤網路使率並發現安全和性能問題,引發故障。
  11. The other one is the synthetical local nonlinear pca neural network recognition model constructed by combining the nonlinear generalization of pca and sub - space pattern recognition technology. we use the two recognition systems in handwritten digitals and characters recognition and obtain some satisfactory results. compared with some traditional classifiers, our systems have better recognition performances

    而基於非線性pca的神經網路識別模型對傳統的線性pca進行了推廣,並利了子空間的模式識別方法,針對每字元類使神經網路建立模板,然後利pca神經網路和聚類演算法構造自動編碼器組對模式類進行重構,了特徵提取的復雜性和信息的丟失,提高了系統的識別性能和運算效率。
  12. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應是由組件組成,因此為了解決上述問題,實現高效的應,本文首先從如何合理組合組件入手,找到一種方法使各組件能具體分工而又緊密合作,在深入研究各組件基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組件,該模型可以解決傳統web開發中存在的問題,而且具有系統流程與系統功能劃分清晰,可擴展性、可維護性強等優點,另外由於控制器是ejsmvc模型的重中之重,它起到承上啟下的作,它設計好壞直接關繫到整的性能、伸縮性與擴展性,因此又探討了控制器設計的有關問題;另外如果模型設計不當的話,對系統性能造成的影響可能是致命的,因此本文又從ejb組件選擇、 ejb調優設計、數據庫訪問和設計模式等方面對ejb技術作了全面的分析研究,指出在業務層中如何網路遠程調和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,這模型的使無疑會使業務層具有較高的性能與伸縮性;最後選擇一業務邏輯較簡單的系統,使注意力集中到運的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論文所提出的方法與策略實現業務邏輯,在實現過程中具體探討如何合理運組合技術,就層j2ee體系結構的設計思想作深入的探討實踐,為實現高效、靈活的層j2ee應提供一種新的思路及方法。
  13. This paper also proposes an intelligent approach based on rsfm network to estimate the parameters of abnormal patterns such as trend slope, shift magnitude, cycle amplitude and cycle length. simulation results show the proposed network possesses advantages of quick training and good estimation performance. 3

    為了有效估計異常模式的參數值,不同參數估計間的互相干擾,採網路分別對不同模式的參數進行估計,採這種方法也使得整參數估計模塊具有自適應能力,當加工過程遇到一新的模式,在參數估計模塊相應加入一網路對其進行訓練。
  14. Comment : the results of this population - based study confirm those of previous studies that found an association between multiple doses of antibiotics and development of childhood asthma and provide yet another reason to avoid unnecessary use of antibiotics, particularly broad - spectrum agents

    評論:這人群研究的結果證實了之前研究的結果:發現了倍劑量的抗生素治療和哮喘發病之間的關系,為使不需要的抗生素提供了又一理由,特別是廣譜抗生素。
  15. In order to avoid embarrassing ( and even costly ) issues, you have the option of mixing colors

    為了能夠令人沮喪的(甚至是昂貴的)話題,你可以使種混合的顏色。
  16. Avoid indexed properties with more than one parameter

    使具有參數的索引屬性。
  17. Thus, we employ several lyapunov functions including partial components and avoid using p function to obtain some stability results of the trivial solution of system ( 1 ), such as stability, equi - asymptotic stability, uniformly asymptotic stability and so on. in these theorems, the conditions are less restrictive

    因此,本章運部分lyapunov函數,使p函數,在較少的限制條件下得到了系統( 1 )的零解的穩定性、等度漸近穩定性、一致漸近穩定性等定理,並且得到了一些推論
  18. The individual svm is prone to fail in the intrusion detection for the fragility of being attacked. this paper addresses a method using a support vector machines ensemble approach based on negative correlation learning for intrusion detection. using a correlation penalty term in the error function, the aggregate members can be accurate and diverse. and the evolutionary strategy is considered as the best way to automatically determine the individ. ual svms hyperparameters. at last we combine the results of all individual svms using ensemble technique. this distributed parallel detection can strengthen the robustness of the system. simulation results show the effectiveness of the method presented in this paper

    在入侵檢測中使的支持向量機容易因"單點失效"而危害系統安全.提出一種基於支持向量機集成的方法來進行入侵檢測.它採負相關學習技術,在誤差項中使相關性懲罰因子使得生成的分類器有更好的樣性和精度;演算法採進化策略來自動地確定體支持向量機的超參數,了需要了解問題的先驗知識;最後,採集成技術來組合體支持向量機的檢測結果.模擬實驗表明這一方法有更好的檢測性能,並且這種分散式并行檢測方法有利於增加入侵檢測系統的魯棒性
  19. This paper proposes a new algorithm adopting the multi - trajectory dynamic tunneling technique and the error - limitation dynamic changing technique to train the bp neural networks. the simulation results are provided for three different examples to demonstrate the performance of the proposed method in overcoming the problems of initialization and searching efficiency. the performance of the conventional dynamic tunneling technique and the multi - trajectory dynamic tunneling technique in training bp neural networks are also given and compared in this paper

    並將該演算法在xor 、某醫藥公司物流數據和kddcup三數據集上進行了測試,對傳統動態隧道技術訓練bp網路演算法( dttbp ) 、單純使軌道思想的動態隧道技術訓練bp網路演算法( smdttbp )和本文提出的使軌道動態隧道思想結合動態修改誤差限方法的軌道動態隧道訓練bp網路演算法( mdttbp )的實驗結果進行了對比分析,證明提出的演算法可以有效地陷入局部極小,同時也提高了傳統動態隧道技術訓練bp網路演算法的搜索效率。
  20. To avoid rolling forward a lot of transaction log backups, consider using differential file backups

    若要前滾事務日誌備份,請考慮使差異文件備份。
分享友人